Sciweavers

12183 search results - page 165 / 2437
» Computers under Attacks!
Sort
View
AINA
2007
IEEE
15 years 11 months ago
Detecting Coordinated Distributed Multiple Attacks
This paper describes results concerning the robustness and generalization capabilities of kernel methods in detecting coordinated distributed multiple attacks (CDMA) using network...
Srinivas Mukkamala, Krishna Yendrapalli, Ram B. Ba...
CCS
2007
ACM
15 years 11 months ago
Optimal security hardening using multi-objective optimization on attack tree models of networks
Researchers have previously looked into the problem of determining if a given set of security hardening measures can effectively make a networked system secure. Many of them also...
Rinku Dewri, Nayot Poolsappasit, Indrajit Ray, Dar...
CCECE
2006
IEEE
15 years 11 months ago
Detecting Distributed Denial of Service Attack Traffic at the Agent Machines
Due to financial losses caused by Distributed Denial of Service (DDoS) attacks, most defence mechanisms have been deployed at the network where the target server is located. We be...
Vicky Laurens, Abdulmotaleb El-Saddik, Pulak Dhar,...
117
Voted
PRDC
2006
IEEE
15 years 11 months ago
Base Address Recognition with Data Flow Tracking for Injection Attack Detection
Vulnerabilities such as buffer overflows exist in some programs, and such vulnerabilities are susceptible to address injection attacks. The input data tracking method, which was ...
Satoshi Katsunuma, Hiroyuki Kurita, Ryota Shioya, ...
EUC
2007
Springer
15 years 9 months ago
An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks
Traditional cryptographic primitives are not supported on low-cost RFID tags since, at most, 4K gates can be devoted to securityrelated tasks. Despite this, there are a vast number...
Pedro Peris-Lopez, Julio César Herná...